risk decision

Results 1 - 25 of 91Sort Results By: Published Date | Title | Company Name
Published By: Sift     Published Date: Oct 16, 2019
"In today’s digital landscape, balancing user experience with customer safety has never been more important -- or more difficult. By surveying 500 employees responsible for fighting fraud, Sift found that 77% prioritize delivering a frictionless experience, but nearly as many say fraud prevention blocks this goal. The answer isn’t additional fraud prevention. Businesses must adopt a Digital Trust & Safety approach, strategically aligning risk and revenue decisions supported by sophisticated processes and technology. How can you optimize your business strategies for the challenges and opportunities of the digital world? Read This Guide To Find Out How to move beyond reactive fraud-fighting strategies and deliver excellent customer experiences without compromising safety The 4 qualities of a Digital Trust & Safety organization A step-by-step guide to help you evolve to Digital Trust & Safety Why the time for Digital Trust & Safety is now "
Tags : 
    
Sift
Published By: Dell EMC     Published Date: Oct 10, 2019
Security leaders have been in front of boards and executive committees long enough to know that security metrics that simply portray statistics from monitoring tools, or count the number of malware attacks, add relatively little value to strategy and budget decisions. Protecting sensitive customer and company data shouldn’t be just a compliance obligation, it should be a business imperative. This is exactly why the right technology partners will help push security, risk, and compliance objectives forward. In March 2019, Dell commissioned Forrester Consulting to evaluate the evolving security trends and technology needed to protect and enable employees. Our study found that empowering employees while adhering to security protocols improves employee productivity. Forrester conducted an online survey of 887 senior business and IT decision makers to explore this topic. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC
Published By: Marketo     Published Date: Sep 03, 2019
Having to make big decisions on behalf of your entire business can be intimidating — as marketers, sometimes we’d rather choose to play it safe and see what unfolds naturally, instead of risking the “wrong” move. But what if we told you the safer choice isn't actually safe at all? It's true: indecision and lack of action can actually pose far more of a threat to the wellbeing of your business than you might think. Download this ebook to learn the five biggest risks that come with staying passive, and see why tackling your decisions head-on matters.
Tags : 
    
Marketo
Published By: Group M_IBM Q3'19     Published Date: Aug 26, 2019
Delegating data security to IT teams does not absolve the responsibility business leaders have to protect data. Forrester Consulting surveyed 150 IT, security, and risk decision makers and examined their approach to protecting their company’s critical data and information and communicating data risk to senior business executives. Read this report to gain a better understanding of: ? Who is most accountable to external parties following a data breach ? The importance for business executives to have visibility into data security metrics ? How to overcome challenges to equip business executives with data security information ? When executive level security tools can improve business executives ability to proactively manage data risk
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Aug 26, 2019
Delegating data security to IT teams does not absolve the responsibility business leaders have to protect data. Forrester Consulting surveyed 150 IT, security, and risk decision makers and examined their approach to protecting their company’s critical data and information and communicating data risk to senior business executives. Read this report to gain a better understanding of: ? Who is most accountable to external parties following a data breach ? The importance for business executives to have visibility into data security metrics ? How to overcome challenges to equip business executives with data security information ? When executive level security tools can improve business executives ability to proactively manage data risk
Tags : 
    
Group M_IBM Q3'19
Published By: Riskified     Published Date: Aug 06, 2019
As the global eCommerce market grows and fraudster methodology evolves, new fraud management approaches and tools are being introduced at a fast pace. Trying to stay on top of developments in the eCommerce fraud prevention landscape can be overwhelming and time consuming. Riskified is proud to present the eCommerce Fraud Solution Buyer’s Kit, a comprehensive series of resources designed to guide executives, decision makers, and procurement professionals through the process of assessing current fraud management performance and understanding which available approaches and solutions can best meet their needs.
Tags : 
    
Riskified
Published By: RMS     Published Date: Jul 18, 2019
The more holistic view of risk a property underwriter can get, the better decisions they are likely to make. In order to build up a detailed picture of risk at an individual location, underwriters or agents at coverholders have, until now, had to request exposure analytics on single risks from their portfolio managers and brokers. Also, they had to gather supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones to look-ups on Google Maps.
Tags : 
    
RMS
Published By: Sift     Published Date: Jul 12, 2019
"In today’s digital landscape, balancing user experience with customer safety has never been more important -- or more difficult. By surveying 500 employees responsible for fighting fraud, Sift found that 77% prioritize delivering a frictionless experience, but nearly as many say fraud prevention blocks this goal. The answer isn’t additional fraud prevention. Businesses must adopt a Digital Trust & Safety approach, strategically aligning risk and revenue decisions supported by sophisticated processes and technology. How can you optimize your business strategies for the challenges and opportunities of the digital world? Read This Guide To Find Out How to move beyond reactive fraud-fighting strategies and deliver excellent customer experiences without compromising safety The 4 qualities of a Digital Trust & Safety organization A step-by-step guide to help you evolve to Digital Trust & Safety Why the time for Digital Trust & Safety is now"
Tags : 
    
Sift
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
To gain better insight into today’s work practices and risks, IDG Research Services surveyed IT security decision-makers (ITSDMs) as well as end users to gauge VPN usage. Download the white paper to learn several security capabilities identified by IDG that, if available, could prove extremely valuable in reducing the risk of off-network laptop usage.
Tags : 
    
Cisco Umbrella EMEA
Published By: FICO EMEA     Published Date: May 21, 2019
Fintechs and challenger banks have put a dent in the financial services universe. By developing compelling new products, services and experiences, these companies have set a new standard and raised customers expectations. While traditional banks work to meet these raised expectations, the challenge for new market entrants is turning their beachheads into sustainable, profitable businesses. FICO facilitates this transformation with its industry-leading risk decisioning capabilities.
Tags : 
fitech, risk decisioning, challenger bank, banking
    
FICO EMEA
Published By: TIBCO Software     Published Date: May 16, 2019
This infographic describes the growing financial crime problem from several perspectives and sets out reasons why now is the time to move to self-learning analytics and other technologies available on the TIBCO platform for: Monitoring transactions as they occur Easily generating contextual views using accurate, real-time information Expediting the investigation process Evaluating potentially risky transactions Making the right decisions quickly
Tags : 
    
TIBCO Software
Published By: Tenable     Published Date: Feb 27, 2019
"Unlike other business disciplines (CRM, ERP, HR), cybersecurity lacks clear business metrics that help frame decision-making in language the C-suite and board easily understand. To evaluate which metrics matter most, Tenable commissioned Ponemon Institute to study the effects of cyber risk on business operations. The study, which surveyed 2,410 IT and infosec decision-makers in the US, UK, Germany, Australia, Mexico and Japan. Download the report now to: -See why organizations are vulnerable to multiple cyber attacks. Compare your own practices for measuring the business costs of cyber risk against those of peers in six countries. -Explore the seven key reasons why organizations struggle to evaluate the business impact of cyber events. -Get five tips, based on the research, that you can use today to start improving your ability to mitigate cyber risks in your own organization."
Tags : 
    
Tenable
Published By: Citrix Systems     Published Date: Feb 14, 2019
"If you're moving to multi-, hybrid-, or cloud-based infrastructures, your networking solution could be the key to a streamlined transition. In our e-book, ""How your network can take on the cloud — and win,"" you'll learn how the right network solution will simplify app delivery and protect your entire infrastructure, so that you can navigate your journey to the cloud with confidence. Download our e-book and find out how: - Reduce risks with secure contextualized access - Ensure reliability and performance - Make informed decisions using intelligent insights and visibility"
Tags : 
    
Citrix Systems
Published By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to analyzing and mitigating the risks of migrating to PostgreSQL. With the ongoing shift towards open-source database solutions, it’s no surprise that PostgreSQL is the fastest growing database. While it’s tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. A key decision criteria for adopting any technology is whether it can support requirements for existing applications while also fitting into longer term strategies and needs. The first section of this eBook provides a detailed analysis of all aspects of migrating from legacy and commercial solutions to PostgreSQL: ? Schema and code migration ? Data migration ? Application code migration ? Testing and evaluation
Tags : 
    
Stratoscale
Published By: Tenable     Published Date: Jan 25, 2019
"Unlike other business disciplines (CRM, ERP, HR), cybersecurity lacks clear business metrics that help frame decision-making in language the C-suite and board easily understand. To evaluate which metrics matter most, Tenable commissioned Ponemon Institute to study the effects of cyber risk on business operations. The study, which surveyed 2,410 IT and infosec decision-makers in the US, UK, Germany, Australia, Mexico and Japan. Download the report now to: -See why organizations are vulnerable to multiple cyber attacks. Compare your own practices for measuring the business costs of cyber risk against those of peers in six countries. -Explore the seven key reasons why organizations struggle to evaluate the business impact of cyber events. -Get five tips, based on the research, that you can use today to start improving your ability to mitigate cyber risks in your own organization."
Tags : 
    
Tenable
Published By: IBM Watson Health     Published Date: Dec 20, 2018
In this webinar, experts discuss how data and analytics can be applied to improve health program outcomes and how social determinants of health affect risk. It includes a case study on how the application of advanced analytic methods helped to decipher the impact of high-priced specialty drugs on the overall population. The experts also address how artificial intelligence can drive better decision-making, improve population health and cut costs.
Tags : 
government, health and human services, artificial intelligence, data, cognitive insights, long-term care, case study, analytics
    
IBM Watson Health
Published By: BMC ASEAN     Published Date: Dec 18, 2018
From the impact of disruptive technologies to the imperative of digital transformation, businesses today must find new ways to innovate or risk being left behind. While data flowing rapidly between the Internet of Things and multi-cloud computing environments brings tremendous opportunity, there’s also a great deal of complexity. Artificial intelligence (AI) and machine learning (ML) are part of the new wave of solutions capturing the minds of enterprise leaders to respond to these new opportunities and complexities. Digitally literate leaders who are highly cognizant of this wave, are jumping in headfirst and applying AI and ML to solve real business challenges—making enterprise goals of enabling cost savings via smarter operations and decision making come to fruition. BMC Cognitive Service Management (CSM) addresses the complexities of multi-cloud computing by applying intelligence, automation, and predictive capabilities. CSM employs a differentiated approach with a more holistic
Tags : 
    
BMC ASEAN
Published By: Panasonic     Published Date: Nov 07, 2018
Proprietary study reveals benefits of embracing disruptive technology vs. risks of waiting. A recent survey of more than 400 technology decision makers across 13 industries indicates that early adoption of disruptive technology is seen as less risky than waiting. Across all industries, including among technology leaders in Automotive, there was near consensus that adopting disruptive technology has become the price of doing business and staying in business.
Tags : 
    
Panasonic
Published By: Panasonic     Published Date: Nov 07, 2018
Proprietary study reveals benefits of embracing disruptive technology vs. risks of waiting. A recent survey of more than 400 technology decision makers across 13 industries indicates that early adoption of disruptive technology is seen as less risky than waiting. Among technology leaders across all industries, including Food Retail, there was near consensus that adopting disruptive technology has become the price of doing business and staying in business.
Tags : 
    
Panasonic
Published By: Panasonic     Published Date: Nov 07, 2018
Proprietary study reveals benefits of embracing disruptive technology vs. risks of waiting. A recent survey of more than 400 technology decision makers across 13 industries indicates that early adoption of disruptive technology is seen as less risky than waiting. Among technology leaders across all industries, including Government & Public Safety, there is near consensus that adopting disruptive technology has become the price of doing business and staying in business.
Tags : 
    
Panasonic
Published By: Qualtrics     Published Date: Oct 04, 2018
Advertising is a high-risk game. Done well, ads break through the noise, spark conversations about your brand, drive demand, and boost sales. Done poorly, ads bury your messages, damage your brand image, fail to generate revenue, and waste budget on expensive campaigns that fail to deliver. With so much on the line, getting your ads right is crucial. How do you ensure success? Ad testing. As the name implies, ad testing is validating your ad with your target audience prior to launch. You can test individual portions of your ad, like messaging, headlines, visuals or calls to action, or even initial reactions to early ad concepts. Ad testing gives you the following benefits: • Predict the effect on purchase intent • Make informed go or no-go decisions on a specific ad launch • Understand how your brand is perceived • Get the highest ROI from your ad spend Ad testing is one of the best ways to protect your advertising budget and maximize the chances of landing the right messaging with you
Tags : 
    
Qualtrics
Published By: Juniper Networks     Published Date: Oct 02, 2018
Without specific and explicit design decisions about not only the network architecture but also network operations,enterprises risk drifting toward a future of many clouds, each with their own operational nuances. Those who are not mindful about managing new additions increase the complexity of their network with each variation. This white paper discusses how to approach the design of the network and operations in the move from cloud to multicloud. The focus is on meeting the business needs of today and tomorrow, battling complexity, preserving the possibilities for options, and supporting IT’s role as the steward of technology decisions for the business.
Tags : 
    
Juniper Networks
Published By: TIBCO Software     Published Date: Sep 21, 2018
BUSINESS CHALLENGE “Vestas is a global market leader in manufacturing and servicing wind turbines,” explains Sven Jesper Knudsen, Ph.D., senior data scientist. “Turbines provide a lot of data, and we analyze that data, adapt to changing needs, and work to create a best-in-class wind energy solution that provides the lowest cost of energy. “To stay ahead, we have created huge stacks of technologies—massive amounts of data storage and technologies to transform data with analytics. That comes at a cost. It requires maintenance and highly skilled personnel, and we simply couldn’t keep up. The market had matured, and to stay ahead we needed a new platform. “If we couldn’t deliver on time, we would let users and the whole business down, and start to lose a lot of money on service. For example, if we couldn’t deliver a risk report on time, decisions would be made without actually understanding the risk landscape.
Tags : 
data solution, technology solution, data science, streaming data, fast data platform, self-service analytics
    
TIBCO Software
Published By: IBM     Published Date: Sep 06, 2018
CISOs Investigate is a series that offers first-hand insights to security leaders as they makebusiness-driven risk and technology decisions
Tags : 
    
IBM
Published By: Splunk     Published Date: Aug 22, 2018
Gartner's “2017 Critical Capabilities for Security Information and Event Management” report assesses eight SIEM capabilities against the increasingly complex vendor landscape. The conclusion? Splunk had the highest score in the Security Monitoring use case. We believe customers rely on Splunk’s advanced security analytics capabilities to meet their SIEM and security intelligence needs — improving threat detection, investigation and time to remediation. It’s proven to help with compliance and incident reporting, automated alerting of common security events and historical analysis for detected incidents. CISOs, CIOs, and security and risk leaders should download Gartner’s annual report to make the best-informed buying decision for security and learn about Splunk’s leadership position in the market.
Tags : 
    
Splunk
Start   Previous   1 2 3 4    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.